US7650502B2 - Method of communications and communication network intrusion protection methods and intrusion attempt detection system - Google Patents
Method of communications and communication network intrusion protection methods and intrusion attempt detection system Download PDFInfo
- Publication number
- US7650502B2 US7650502B2 US11/712,458 US71245807A US7650502B2 US 7650502 B2 US7650502 B2 US 7650502B2 US 71245807 A US71245807 A US 71245807A US 7650502 B2 US7650502 B2 US 7650502B2
- Authority
- US
- United States
- Prior art keywords
- telephony device
- mobile telephony
- identifier
- permanent identifier
- cyber
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/141—Denial of service attacks against endpoints in a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/35—Network arrangements, protocols or services for addressing or naming involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function
Abstract
Description
Claims (21)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/712,458 US7650502B2 (en) | 1999-05-17 | 2007-03-01 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US12/687,700 US8176326B2 (en) | 1999-05-17 | 2010-01-14 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US13/465,901 US20120222090A1 (en) | 1999-05-17 | 2012-05-07 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13454799P | 1999-05-17 | 1999-05-17 | |
US09/571,377 US6981146B1 (en) | 1999-05-17 | 2000-05-15 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US11/094,249 US7506166B2 (en) | 1999-05-17 | 2005-03-31 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US11/712,458 US7650502B2 (en) | 1999-05-17 | 2007-03-01 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/094,249 Continuation US7506166B2 (en) | 1999-05-17 | 2005-03-31 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/687,700 Continuation US8176326B2 (en) | 1999-05-17 | 2010-01-14 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070162754A1 US20070162754A1 (en) | 2007-07-12 |
US7650502B2 true US7650502B2 (en) | 2010-01-19 |
Family
ID=34810886
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/571,377 Expired - Lifetime US6981146B1 (en) | 1999-05-17 | 2000-05-15 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US11/094,249 Expired - Lifetime US7506166B2 (en) | 1999-05-17 | 2005-03-31 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US11/712,458 Expired - Fee Related US7650502B2 (en) | 1999-05-17 | 2007-03-01 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US12/368,348 Expired - Fee Related US7865732B2 (en) | 1999-05-17 | 2009-02-10 | Method and communications and communication network intrusion protection methods and intrusion attempt detection system |
US12/687,700 Expired - Lifetime US8176326B2 (en) | 1999-05-17 | 2010-01-14 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US13/465,901 Abandoned US20120222090A1 (en) | 1999-05-17 | 2012-05-07 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/571,377 Expired - Lifetime US6981146B1 (en) | 1999-05-17 | 2000-05-15 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US11/094,249 Expired - Lifetime US7506166B2 (en) | 1999-05-17 | 2005-03-31 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
Family Applications After (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/368,348 Expired - Fee Related US7865732B2 (en) | 1999-05-17 | 2009-02-10 | Method and communications and communication network intrusion protection methods and intrusion attempt detection system |
US12/687,700 Expired - Lifetime US8176326B2 (en) | 1999-05-17 | 2010-01-14 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US13/465,901 Abandoned US20120222090A1 (en) | 1999-05-17 | 2012-05-07 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
Country Status (1)
Country | Link |
---|---|
US (6) | US6981146B1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100042744A1 (en) * | 2008-08-18 | 2010-02-18 | Moshiur Rahman | Method and apparatus for providing alarm correlation for a gateway router |
US20100115280A1 (en) * | 1999-05-17 | 2010-05-06 | Invicta Networks Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US9591022B2 (en) | 2014-12-17 | 2017-03-07 | The Boeing Company | Computer defenses and counterattacks |
Families Citing this family (50)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7231327B1 (en) * | 1999-12-03 | 2007-06-12 | Digital Sandbox | Method and apparatus for risk management |
US7197563B2 (en) * | 2001-05-31 | 2007-03-27 | Invicta Networks, Inc. | Systems and methods for distributed network protection |
US7089303B2 (en) * | 2000-05-31 | 2006-08-08 | Invicta Networks, Inc. | Systems and methods for distributed network protection |
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US9444785B2 (en) * | 2000-06-23 | 2016-09-13 | Cloudshield Technologies, Inc. | Transparent provisioning of network access to an application |
US8204082B2 (en) | 2000-06-23 | 2012-06-19 | Cloudshield Technologies, Inc. | Transparent provisioning of services over a network |
WO2002017594A2 (en) | 2000-08-18 | 2002-02-28 | Invicta Networks, Inc. | Systems and methods for distributed network protection |
EP1410559A4 (en) * | 2001-03-01 | 2004-11-24 | Invicta Networks Inc | Systems and methods that provide external network access from a protected network |
US7370356B1 (en) * | 2002-01-23 | 2008-05-06 | Symantec Corporation | Distributed network monitoring system and method |
GB2397402A (en) * | 2003-01-20 | 2004-07-21 | Mitel Networks Corp | Internet proxy that supports location-based services |
WO2005036339A2 (en) * | 2003-10-03 | 2005-04-21 | Enterasys Networks, Inc. | System and method for dynamic distribution of intrusion signatures |
US7383583B2 (en) * | 2004-03-05 | 2008-06-03 | Microsoft Corporation | Static and run-time anti-disassembly and anti-debugging |
US8074277B2 (en) * | 2004-06-07 | 2011-12-06 | Check Point Software Technologies, Inc. | System and methodology for intrusion detection and prevention |
CN100370757C (en) * | 2004-07-09 | 2008-02-20 | 国际商业机器公司 | Method and system for dentifying a distributed denial of service (DDOS) attack within a network and defending against such an attack |
US8429393B1 (en) * | 2004-09-30 | 2013-04-23 | Rockwell Automation Technologies, Inc. | Method for obscuring a control device's network presence by dynamically changing the device's network addresses using a cryptography-based pattern |
US9100422B1 (en) * | 2004-10-27 | 2015-08-04 | Hewlett-Packard Development Company, L.P. | Network zone identification in a network security system |
US7827608B2 (en) * | 2005-02-08 | 2010-11-02 | International Business Machines Corporation | Data leak protection system, method and apparatus |
US7698492B2 (en) * | 2005-04-28 | 2010-04-13 | Samsung Electronics Co., Ltd. | Guaranteed services method and apparatus in bridged LAN |
WO2007030506A2 (en) * | 2005-09-07 | 2007-03-15 | International Business Machines Corporation | Automated deployment of protection agents to devices connected to a distributed computer network |
US20070157316A1 (en) * | 2005-12-30 | 2007-07-05 | Intel Corporation | Managing rogue IP traffic in a global enterprise |
US7712134B1 (en) * | 2006-01-06 | 2010-05-04 | Narus, Inc. | Method and apparatus for worm detection and containment in the internet core |
US20070210909A1 (en) * | 2006-03-09 | 2007-09-13 | Honeywell International Inc. | Intrusion detection in an IP connected security system |
US8787633B2 (en) * | 2007-01-16 | 2014-07-22 | Purdue Research Foundation | System and method of organism identification |
US7917446B2 (en) * | 2007-10-31 | 2011-03-29 | American Express Travel Related Services Company, Inc. | Latency locator |
WO2009129037A2 (en) * | 2008-04-14 | 2009-10-22 | Invicta Networks, Inc. | Method and system for creating and managing a variable number of visible interne protocol (ip) addresses |
US20120137345A1 (en) * | 2009-08-10 | 2012-05-31 | Invicta Networks, Inc. | System and method for cyber object protection using variable cyber coordinates (vcc) |
US8601587B1 (en) | 2009-09-04 | 2013-12-03 | Raytheon Company | System, method, and software for cyber threat analysis |
WO2012048206A2 (en) * | 2010-10-08 | 2012-04-12 | Virginia Tech Intellectual Properties, Inc. | Method and system for dynamically obscuring addresses in ipv6 |
US8874763B2 (en) * | 2010-11-05 | 2014-10-28 | At&T Intellectual Property I, L.P. | Methods, devices and computer program products for actionable alerting of malevolent network addresses based on generalized traffic anomaly analysis of IP address aggregates |
US8549612B2 (en) | 2011-11-28 | 2013-10-01 | Dell Products, Lp | System and method for incorporating quality-of-service and reputation in an intrusion detection and prevention system |
US8935780B2 (en) | 2012-02-09 | 2015-01-13 | Harris Corporation | Mission management for dynamic computer networks |
US8819818B2 (en) | 2012-02-09 | 2014-08-26 | Harris Corporation | Dynamic computer network with variable identity parameters |
US8898795B2 (en) | 2012-02-09 | 2014-11-25 | Harris Corporation | Bridge for communicating with a dynamic computer network |
US9154458B2 (en) | 2012-05-01 | 2015-10-06 | Harris Corporation | Systems and methods for implementing moving target technology in legacy hardware |
US8959573B2 (en) | 2012-05-01 | 2015-02-17 | Harris Corporation | Noise, encryption, and decoys for communications in a dynamic computer network |
US9130907B2 (en) | 2012-05-01 | 2015-09-08 | Harris Corporation | Switch for communicating data in a dynamic computer network |
US8935786B2 (en) | 2012-05-01 | 2015-01-13 | Harris Corporation | Systems and methods for dynamically changing network states |
US8898782B2 (en) | 2012-05-01 | 2014-11-25 | Harris Corporation | Systems and methods for spontaneously configuring a computer network |
US9075992B2 (en) | 2012-05-01 | 2015-07-07 | Harris Corporation | Systems and methods for identifying, deterring and/or delaying attacks to a network using shadow networking techniques |
US8966626B2 (en) | 2012-05-01 | 2015-02-24 | Harris Corporation | Router for communicating data in a dynamic computer network |
US9203798B2 (en) | 2013-07-18 | 2015-12-01 | Empire Technology Development Llc | Time based IP address hopping |
US9503324B2 (en) | 2013-11-05 | 2016-11-22 | Harris Corporation | Systems and methods for enterprise mission management of a computer network |
US9264496B2 (en) | 2013-11-18 | 2016-02-16 | Harris Corporation | Session hopping |
US9338183B2 (en) | 2013-11-18 | 2016-05-10 | Harris Corporation | Session hopping |
US10122708B2 (en) | 2013-11-21 | 2018-11-06 | Harris Corporation | Systems and methods for deployment of mission plans using access control technologies |
US10298598B1 (en) * | 2013-12-16 | 2019-05-21 | Amazon Technologies, Inc. | Countering service enumeration through imposter-driven response |
US10554683B1 (en) * | 2016-05-19 | 2020-02-04 | Board Of Trustees Of The University Of Alabama, For And On Behalf Of The University Of Alabama In Huntsville | Systems and methods for preventing remote attacks against transportation systems |
EP3620725B1 (en) | 2018-09-07 | 2021-09-22 | Oeliatec | Water heating device for cluster weeding apparatus designed to provide a constant temperature at the nozzle outlet of 95 to 99°c |
FR3104000B1 (en) | 2019-12-06 | 2021-11-05 | Oeliatec | Hydraulic device for motorizing a water pump contained in a hot water weeding device installed on an agricultural vehicle for the purpose of regulating the water temperature |
CN113824700B (en) * | 2021-08-31 | 2022-11-15 | 浙江大学 | Dual-stage software defined network flow table overflow defense method based on port similarity |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4334322A (en) | 1979-10-26 | 1982-06-08 | E-Systems, Inc. | Communication management system for providing antijam/privacy capabilities for voice radio communications |
US4800590A (en) | 1985-01-14 | 1989-01-24 | Willis E. Higgins | Computer key and computer lock system |
US5278901A (en) | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method |
US5517567A (en) | 1994-08-23 | 1996-05-14 | Daq Electronics Inc. | Key distribution system |
US5537099A (en) | 1992-04-16 | 1996-07-16 | Bay Networks, Inc. | Receiving port security in a network concentrator |
US5659615A (en) | 1994-11-14 | 1997-08-19 | Hughes Electronics | Secure satellite receive-only local area network with address filter |
US5678002A (en) | 1995-07-18 | 1997-10-14 | Microsoft Corporation | System and method for providing automated customer support |
US5742666A (en) | 1994-10-05 | 1998-04-21 | Tele Digital Development, Inc. | Emergency mobile telephone |
US5796942A (en) | 1996-11-21 | 1998-08-18 | Computer Associates International, Inc. | Method and apparatus for automated network-wide surveillance and security breach intervention |
US5805801A (en) | 1997-01-09 | 1998-09-08 | International Business Machines Corporation | System and method for detecting and preventing security |
US5892903A (en) | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
US5898830A (en) | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
US5905859A (en) | 1997-01-09 | 1999-05-18 | International Business Machines Corporation | Managed network device security method and apparatus |
US5991881A (en) | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
US6128742A (en) | 1998-02-17 | 2000-10-03 | Bea Systems, Inc. | Method of authentication based on intersection of password sets |
US6981146B1 (en) | 1999-05-17 | 2005-12-27 | Invicta Networks, Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6984146B1 (en) * | 2003-05-13 | 2006-01-10 | Boudreau Beverly A | Power connection assembly with fluorescent markings |
-
2000
- 2000-05-15 US US09/571,377 patent/US6981146B1/en not_active Expired - Lifetime
-
2005
- 2005-03-31 US US11/094,249 patent/US7506166B2/en not_active Expired - Lifetime
-
2007
- 2007-03-01 US US11/712,458 patent/US7650502B2/en not_active Expired - Fee Related
-
2009
- 2009-02-10 US US12/368,348 patent/US7865732B2/en not_active Expired - Fee Related
-
2010
- 2010-01-14 US US12/687,700 patent/US8176326B2/en not_active Expired - Lifetime
-
2012
- 2012-05-07 US US13/465,901 patent/US20120222090A1/en not_active Abandoned
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4334322A (en) | 1979-10-26 | 1982-06-08 | E-Systems, Inc. | Communication management system for providing antijam/privacy capabilities for voice radio communications |
US4800590A (en) | 1985-01-14 | 1989-01-24 | Willis E. Higgins | Computer key and computer lock system |
US5537099A (en) | 1992-04-16 | 1996-07-16 | Bay Networks, Inc. | Receiving port security in a network concentrator |
US5278901A (en) | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method |
US5517567A (en) | 1994-08-23 | 1996-05-14 | Daq Electronics Inc. | Key distribution system |
US5742666A (en) | 1994-10-05 | 1998-04-21 | Tele Digital Development, Inc. | Emergency mobile telephone |
US5659615A (en) | 1994-11-14 | 1997-08-19 | Hughes Electronics | Secure satellite receive-only local area network with address filter |
US5678002A (en) | 1995-07-18 | 1997-10-14 | Microsoft Corporation | System and method for providing automated customer support |
US5892903A (en) | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
US5898830A (en) | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
US5991881A (en) | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
US5796942A (en) | 1996-11-21 | 1998-08-18 | Computer Associates International, Inc. | Method and apparatus for automated network-wide surveillance and security breach intervention |
US5905859A (en) | 1997-01-09 | 1999-05-18 | International Business Machines Corporation | Managed network device security method and apparatus |
US5805801A (en) | 1997-01-09 | 1998-09-08 | International Business Machines Corporation | System and method for detecting and preventing security |
US6128742A (en) | 1998-02-17 | 2000-10-03 | Bea Systems, Inc. | Method of authentication based on intersection of password sets |
US6981146B1 (en) | 1999-05-17 | 2005-12-27 | Invicta Networks, Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US7506166B2 (en) | 1999-05-17 | 2009-03-17 | Invicta Networks, Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
Non-Patent Citations (6)
Title |
---|
Dahlia Malkhi, et al.; "Secure Execution of Java Applets Using a Remote Playground"; AT&T Labs Research, Florham Park, NJ; 1988 IEEE; pp. 40-51. |
European Patent Office European Search Report for Patent Application No. EP 05 2555; Mailed Apr. 29, 2008. |
John Pescatore; "Secure Use of the World Wide Web: Keeping Browsers and Servers From Getting Snared"; Trusted Information System; ISBN# 0-7803-3277-6; pp. 36-38. |
RFC: 2516, Mamakos, et al.; "A Method for Transmitting PPP Over Ethernet (PPPoE)", Feb. 1999; pp. 1-17. |
RSA Security; "Are Passwords Really Free? A Closer Look at the Hidden Costs of Password Security"; pp. 1-8. |
U.S. Appl. No. 12/368,348, filed Feb. 10, 2009. |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100115280A1 (en) * | 1999-05-17 | 2010-05-06 | Invicta Networks Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US8176326B2 (en) * | 1999-05-17 | 2012-05-08 | Invicta Networks, Inc. | Method of communications and communication network intrusion protection methods and intrusion attempt detection system |
US20100042744A1 (en) * | 2008-08-18 | 2010-02-18 | Moshiur Rahman | Method and apparatus for providing alarm correlation for a gateway router |
US8051202B2 (en) * | 2008-08-18 | 2011-11-01 | At&T Intellectual Property I, L.P. | Method and apparatus for providing alarm correlation for a gateway router |
US9591022B2 (en) | 2014-12-17 | 2017-03-07 | The Boeing Company | Computer defenses and counterattacks |
Also Published As
Publication number | Publication date |
---|---|
US6981146B1 (en) | 2005-12-27 |
US20100042513A1 (en) | 2010-02-18 |
US20070162754A1 (en) | 2007-07-12 |
US20120222090A1 (en) | 2012-08-30 |
US7506166B2 (en) | 2009-03-17 |
US7865732B2 (en) | 2011-01-04 |
US8176326B2 (en) | 2012-05-08 |
US20100115280A1 (en) | 2010-05-06 |
US20050172155A1 (en) | 2005-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7650502B2 (en) | Method of communications and communication network intrusion protection methods and intrusion attempt detection system | |
AU2004205339B2 (en) | Method of communications and communication network intrusion protection methods and intrusion attempt detection system | |
Lipson | Tracking and tracing cyber-attacks: Technical challenges and global policy issues | |
US8561139B2 (en) | Method and appartus for network security using a router based authentication | |
CN109347830B (en) | Network dynamic defense system and method | |
US20030037258A1 (en) | Information security system and method` | |
CN106027463B (en) | A kind of method of data transmission | |
Hijazi et al. | Address resolution protocol spoofing attacks and security approaches: A survey | |
CN106027466B (en) | A kind of identity card cloud Verification System and card-reading system | |
Murthy et al. | Firewalls for security in wireless networks | |
Wallich | Wire pirates | |
EP1533700A2 (en) | Method and system for protecting a communication device from intrusion | |
AU2008201287B2 (en) | Method of communications and communication network intrusion protection methods and intrusion attempt detection system | |
US20090067421A1 (en) | Method and device for transferring digital information | |
Wen et al. | Internet security: a case study of firewall selection | |
Karimli | Cloud Risks and Solutions Review | |
Yevseiev et al. | Bogdan Tomashevsky | |
Searls | Identifying Originating Traffic to Anonymity Networks | |
Qiu et al. | Group Oriented Secure Routing Protocol of Mobile Agents | |
REDDY et al. | A Review on Security Issues Related to Computer Networks | |
Anand et al. | Client-End Cryptographic Extensions Threat Analysis & Implementation of DNS Routing Attacks | |
Saeed et al. | A Comprehensive Analysis of Cyber Security Attacks in Virtual Organizations with their Mitigation Plans | |
Saeed et al. | Comparative Analysis of Cyber Security Attacks in Virtual Organizations with their Mitigation Plans |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INVICTA NETWORKS INC., VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:COMSEC CORPORATION;REEL/FRAME:023357/0404 Effective date: 20010807 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20140119 |
|
FEPP | Fee payment procedure |
Free format text: PETITION RELATED TO MAINTENANCE FEES FILED (ORIGINAL EVENT CODE: PMFP); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
PRDP | Patent reinstated due to the acceptance of a late maintenance fee |
Effective date: 20170921 |
|
FEPP | Fee payment procedure |
Free format text: SURCHARGE, PETITION TO ACCEPT PYMT AFTER EXP, UNINTENTIONAL. (ORIGINAL EVENT CODE: M2558); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: PETITION RELATED TO MAINTENANCE FEES GRANTED (ORIGINAL EVENT CODE: PMFG) Free format text: PETITION RELATED TO MAINTENANCE FEES GRANTED (ORIGINAL EVENT CODE: PTGR) |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551) Year of fee payment: 4 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: 7.5 YR SURCHARGE - LATE PMT W/IN 6 MO, SMALL ENTITY (ORIGINAL EVENT CODE: M2555) |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552) Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20220119 |